US20190044722A1 - System for Encryption and Decryption Films of Personal Meetings - Google Patents
System for Encryption and Decryption Films of Personal Meetings Download PDFInfo
- Publication number
- US20190044722A1 US20190044722A1 US15/670,026 US201715670026A US2019044722A1 US 20190044722 A1 US20190044722 A1 US 20190044722A1 US 201715670026 A US201715670026 A US 201715670026A US 2019044722 A1 US2019044722 A1 US 2019044722A1
- Authority
- US
- United States
- Prior art keywords
- key
- film
- personal
- designed
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 210000001525 retina Anatomy 0.000 claims description 3
- 238000011282 treatment Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000011835 investigation Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 238000000554 physical therapy Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G06F19/322—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/637—Control signals issued by the client directed to the server or network components
- H04N21/6377—Control signals issued by the client directed to the server or network components directed to server
- H04N21/63775—Control signals issued by the client directed to the server or network components directed to server for uploading keys, e.g. for a client to communicate its public key to the server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4334—Recording operations
Definitions
- the present invention relates to a recording system for encryption and decryption films of personal meetings which enables decryption of said encrypted films only by the consent of key-holder participant using his or her personal key.
- Such kind of personal meetings can be, for example, meetings between psychologist and patient, in which the patient discloses personal and intimate information that he or she does not want this information to be disclosed; meetings of medical treatment, physiotherapy, surgery and other medical treatments in which the patient may expose intimate parts of his or her body; and meetings between attorney and client when they discuss sensitive matters; meetings between people regarding business or any kind of intimate meeting.
- the expression “personal meeting” in this patent application and in the claims relates to all of those kind of meetings;
- the expression “key-holder participant” in this patent application and in the claims relates to the person who has an interest that the recording will not be exposed without his or her permission, for example, the patients and the clients in those personal meetings, who have the interest that the meeting will be recorded while preventing the ability to view the recording without their specific consent;
- the expression “the service provider” in this patent application and in the claims relates to the persons who participate in the personal meeting other than the key-holder participant, such as the Doctor, the therapist, the lawyer, company manager and the like.
- the present invention offers a solution for the service provider and to the key-holder participant who wish to film the personal meetings in a way that will prevent any access to the films unless such access is authorized by a positive action of the key-holder participant.
- the recording system includes a personal key such that access to the film is possible only when this personal key is used for decryption of the encrypted film.
- the recording system may be used by a therapist and his patients, or by a lawyer and his clients, who wish to document their personal meetings but do not want that the service provider or any other person will be able to access the recording without their specific consent.
- the service providers may wish to use one recording system for many key-holder participants, for example, dentist who wishes to have such system in his clinic where he provides services to many patients each in his turn.
- the system subject matter of the present patent application, offers an excellent solution to this problem.
- it is likely that using the system will reduce risks of breach of confidence, negligence, false accusations, and sexual harassment.
- FIG. 1 describes schematically the recording system ( 1 ) that includes the encryption subsystem ( 2 ), the recording means ( 3 ) and the memory means ( 4 ).
- the main object of the present invention is to provide a recording system that is designed to film personal meetings between a service provider and a key-holder participant by recording means that includes video and audio means and wherein the film is encrypted by an encryption subsystem and that it is possible to decrypt the encrypted film only by a personal key, which is possessed by the key-holder participant.
- the personal meeting can be in fact any kind of meeting. It is possible that the personal meeting will be held between two persons or more. We use the terms “a key-holder participant” and “a service provider” in a singular form but it includes also plural. It is also possible that all the participants will be key-holders and also the service provider. We use the term “service provider” because of that fact that that kind of meeting are highly relevant for this system, but, it is possible that the that person does not provide in fact any service, for example two employees that are used to work together in a specific room and in this case it is possible that only one of them will be the key holder and the second employee will be named the service provider and it is also possible that both of them will be key-holders and this meeting has no service provider.
- the recording system ( 1 ) subject matter of the present invention includes an encryption subsystem ( 2 ), recording means ( 3 ) and a memory means ( 3 ).
- the recording means ( 3 ) includes a video recording means ( 32 ) and may include also a recording voice means ( 31 ) that includes a microphone ( 311 ).
- the recording means ( 3 ) can be of any kind of a recording voice means and of any kind of video recording means that enables audio and video recording.
- the recording means ( 3 ) also includes a transmitting means ( 33 ) for streaming the film to the encryption subsystem ( 2 ).
- the recording system ( 1 ) may employ exiting recording means ( 3 ) that already exists in the relevant place or in the market.
- transmitting and streaming in this application and in the claims refers to a wireless and wired streaming or transmission.
- the transmitting means ( 33 ) includes a port ( 331 ), possible USB, for cable that is designed to stream the film to the encryption subsystem ( 2 ) and in case of wireless streaming then the transmitting means may include network connector ( 332 ).
- the wireless streaming may be based on Wi-Fi or any other known streaming possibilities preferably on secured protocol.
- the memory means ( 4 ) in which the encrypted film should be stored can be any kind of standard memory means in local recordation devices, computer workstations, remote servers (cloud storage) and the like. It is possible to use the exiting computers of the relevant place, using remote servers or even to dedicate specific memory means for storing the decrypted film that available in the market.
- the memory means ( 4 ) also includes a receiving means ( 41 ) for receiving the encrypted film from the encryption subsystem ( 2 ).
- the recording system ( 1 ) may employ memory means ( 4 ) that already exists in the relevant place.
- the term receiving in this application and in the claims refers to wired and wireless receiving.
- the receiving means ( 41 ) includes a port ( 411 ) for cable that is designed to receive the encrypted film from the encryption subsystem ( 2 ) and in case of wireless receiving then the receiving means includes a network connector ( 412 ).
- the wireless receiving may be based on Wi-Fi or any other known receiving options.
- the encryption subsystem ( 2 ) is an essential element of the recording system ( 1 ).
- the encryption subsystem ( 2 ) is designed to receive the film of the personal meeting from the recording means ( 3 ), to encrypt the film and to stream the encrypted film to the memory means ( 4 ).
- the encryption subsystem ( 2 ) also includes a transmitting means ( 22 ) for streaming the encrypted film to the memory means ( 4 ).
- the transmitting means ( 22 ) includes a port ( 221 ) for cable that is designed to stream the encrypted film to the memory means ( 4 ) and in case of wireless transmission then the transmitting means ( 22 ) includes a network connector ( 222 ).
- the wireless streaming may be based on Wi-Fi or any other known transmission options.
- the encryption subsystem ( 2 ) also includes a receiving means ( 21 ) for receiving the film from the recording means ( 3 ).
- the receiving means ( 21 ) includes a port ( 211 ) for cable that is designed to receive the film from the recording means ( 3 ) and in case of wireless receiving then the receiving means ( 21 ) includes a network connector ( 212 ).
- the wireless receiving may be based on Wi-Fi or any other known receiving options.
- the structure of the recording means ( 3 ), the memory means ( 4 ), and the way and manner that they are connected to the encryption subsystem ( 2 ) are understandable from the above explanations to average expert in the field and therefore there is no need for additional details on these matters.
- wireless streaming it is preferably to use a dedicated secret private network, possible by using built-in routers in the recording system.
- the encryption subsystem ( 2 ) includes encryption means ( 23 ) which is designed to encrypt the film which is received from the recording means ( 3 ) and decryption means ( 24 ) which is designed to decrypt the decrypted film which is stored in the memory means ( 4 ).
- the encrypted film can be decrypted only by using a personal key of the key-holder participant. Decryption of the encrypted film and access to the information in it can be done only by using the personal key, and consequently only by the active consent and cooperation of the key-holder participant.
- the key-holder participant possesses the personal key which is designed to decrypt the encrypted film.
- the key-holder participant of the personal meeting knows that there is no reasonable risk to film the personal meeting due to the fact that the film is encrypted and it is inaccessible to any person without his or her consent and without using the personal key that he or she obtains.
- the personal key is a key selected from the group consisting of a password, electronic key, digital key, a key based on magnetic card, a biometric key, a key based on finger print, a key based on retina, or a key based on DNA sample, voice recognition and the like.
- the encryption subsystem ( 2 ) also includes a key reader ( 25 ) which is designed to read the personal keys of the key-holder participants. The key reader ( 25 ) determines in fact the specific possible type of the corresponding personal key.
- the way of using the system ( 1 ) For the sake of fluency we will explain this topic by using an example of a Doctor, a treatment room, a patient and a personal key based on finger print.
- the Doctor (the service provider) installs the system ( 1 ) in the treatment room and when starting the personal meeting the patient (the key-holder participant) puts his finger tip (which is his personal key) on the key reader ( 25 ) which is in this case a finger print reader.
- the recording means ( 3 ) streams the film to the encryption subsystem ( 2 ) that encrypts the film and streams it to the memory means ( 4 ). In the end of the personal meeting the patient may use again his fingerprint for ending the process.
- the encrypted film may be archived in the memory means, in the encryption subsystem or in any other place or media for enabling the service provider or any authorized person to locate these encrypted films and to decrypt them by the encryption subsystem ( 2 ) by using the personal key of the patient. If the patient has a complaint as to an event that to his or her allegation has happened during the personal meeting, then as part of the investigation of this complaint, it is possible to summon the patient to locate the encrypted film, to decrypt it with his or her consent and with his or her own presence, using the personal key that he or she possesses, in order to get to the truth.
- the service provider can install the recording system ( 1 ) in his or her treatment room and to use it for many key-holder participants.
- the key-holder participants can trust the recording system ( 1 ) also due to the fact that it is possible to arrange the encryption subsystem ( 2 ) in one visible tangible casing that encrypts the film of his or her personal meeting. It is possible, but not necessarily, that all the components of the encryption subsystem ( 2 ) will be in one single casing.
- FIG. 1 describes schematically the recording system ( 1 ) that includes the encryption subsystem ( 2 ), the recording means ( 3 ) and the memory means ( 4 ).
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Databases & Information Systems (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Storage Device Security (AREA)
Abstract
Description
- The present invention relates to a recording system for encryption and decryption films of personal meetings which enables decryption of said encrypted films only by the consent of key-holder participant using his or her personal key.
- In many cases disputes arise as to the nature and the content of personal meetings, mainly when such meetings were not recorded and were between two persons in private. Experience of life teaches us that in many such cases one participant alleges ex post facto that during the personal meeting certain events happened or certain spoken words were told and on the other hand the other participant alleges differently. Systems for meeting recordation which include audio and video recordings are known in the art and can provide a satisfying solution in a wide range of cases. However, the solution as described above is not sufficient in special cases, when the key-holder participant has an interest to record the personal meeting and in the same time this recording will be inaccessible to any person without his or her specific consent.
- Such kind of personal meetings can be, for example, meetings between psychologist and patient, in which the patient discloses personal and intimate information that he or she does not want this information to be disclosed; meetings of medical treatment, physiotherapy, surgery and other medical treatments in which the patient may expose intimate parts of his or her body; and meetings between attorney and client when they discuss sensitive matters; meetings between people regarding business or any kind of intimate meeting. The expression “personal meeting” in this patent application and in the claims relates to all of those kind of meetings; The expression “key-holder participant” in this patent application and in the claims relates to the person who has an interest that the recording will not be exposed without his or her permission, for example, the patients and the clients in those personal meetings, who have the interest that the meeting will be recorded while preventing the ability to view the recording without their specific consent; The expression “the service provider” in this patent application and in the claims relates to the persons who participate in the personal meeting other than the key-holder participant, such as the Doctor, the therapist, the lawyer, company manager and the like.
- The present invention offers a solution for the service provider and to the key-holder participant who wish to film the personal meetings in a way that will prevent any access to the films unless such access is authorized by a positive action of the key-holder participant. The recording system includes a personal key such that access to the film is possible only when this personal key is used for decryption of the encrypted film. Thus, for instance, the recording system may be used by a therapist and his patients, or by a lawyer and his clients, who wish to document their personal meetings but do not want that the service provider or any other person will be able to access the recording without their specific consent. Also, the service providers may wish to use one recording system for many key-holder participants, for example, dentist who wishes to have such system in his clinic where he provides services to many patients each in his turn. The system, subject matter of the present patent application, offers an excellent solution to this problem. In addition, it is likely that using the system will reduce risks of breach of confidence, negligence, false allegations, and sexual harassment.
- The intention of the drawings attached to the application is not to limit the scope of the invention and its application. The drawings are intended only to illustrate the invention and they constitute only one of its many possible implementations.
-
FIG. 1 describes schematically the recording system (1) that includes the encryption subsystem (2), the recording means (3) and the memory means (4). - The main object of the present invention is to provide a recording system that is designed to film personal meetings between a service provider and a key-holder participant by recording means that includes video and audio means and wherein the film is encrypted by an encryption subsystem and that it is possible to decrypt the encrypted film only by a personal key, which is possessed by the key-holder participant.
- The personal meeting can be in fact any kind of meeting. It is possible that the personal meeting will be held between two persons or more. We use the terms “a key-holder participant” and “a service provider” in a singular form but it includes also plural. It is also possible that all the participants will be key-holders and also the service provider. We use the term “service provider” because of that fact that that kind of meeting are highly relevant for this system, but, it is possible that the that person does not provide in fact any service, for example two employees that are used to work together in a specific room and in this case it is possible that only one of them will be the key holder and the second employee will be named the service provider and it is also possible that both of them will be key-holders and this meeting has no service provider.
- The recording system (1) subject matter of the present invention includes an encryption subsystem (2), recording means (3) and a memory means (3). The recording means (3) includes a video recording means (32) and may include also a recording voice means (31) that includes a microphone (311). The recording means (3) can be of any kind of a recording voice means and of any kind of video recording means that enables audio and video recording. The recording means (3) also includes a transmitting means (33) for streaming the film to the encryption subsystem (2). The recording system (1) may employ exiting recording means (3) that already exists in the relevant place or in the market. The term transmitting and streaming in this application and in the claims refers to a wireless and wired streaming or transmission. In case of wired streaming the transmitting means (33) includes a port (331), possible USB, for cable that is designed to stream the film to the encryption subsystem (2) and in case of wireless streaming then the transmitting means may include network connector (332). In such case the wireless streaming may be based on Wi-Fi or any other known streaming possibilities preferably on secured protocol.
- The memory means (4) in which the encrypted film should be stored can be any kind of standard memory means in local recordation devices, computer workstations, remote servers (cloud storage) and the like. It is possible to use the exiting computers of the relevant place, using remote servers or even to dedicate specific memory means for storing the decrypted film that available in the market. The memory means (4) also includes a receiving means (41) for receiving the encrypted film from the encryption subsystem (2). As mentioned above, the recording system (1) may employ memory means (4) that already exists in the relevant place. The term receiving in this application and in the claims refers to wired and wireless receiving. In case of wired receiving then the receiving means (41) includes a port (411) for cable that is designed to receive the encrypted film from the encryption subsystem (2) and in case of wireless receiving then the receiving means includes a network connector (412). In such case the wireless receiving may be based on Wi-Fi or any other known receiving options.
- The encryption subsystem (2) is an essential element of the recording system (1). The encryption subsystem (2) is designed to receive the film of the personal meeting from the recording means (3), to encrypt the film and to stream the encrypted film to the memory means (4). The encryption subsystem (2) also includes a transmitting means (22) for streaming the encrypted film to the memory means (4). In case of wired streaming the transmitting means (22) includes a port (221) for cable that is designed to stream the encrypted film to the memory means (4) and in case of wireless transmission then the transmitting means (22) includes a network connector (222). In such case the wireless streaming may be based on Wi-Fi or any other known transmission options. The encryption subsystem (2) also includes a receiving means (21) for receiving the film from the recording means (3). In case of wired receiving then the receiving means (21) includes a port (211) for cable that is designed to receive the film from the recording means (3) and in case of wireless receiving then the receiving means (21) includes a network connector (212). In such case the wireless receiving may be based on Wi-Fi or any other known receiving options.
- The structure of the recording means (3), the memory means (4), and the way and manner that they are connected to the encryption subsystem (2) are understandable from the above explanations to average expert in the field and therefore there is no need for additional details on these matters. In case of wireless streaming it is preferably to use a dedicated secret private network, possible by using built-in routers in the recording system.
- The encryption subsystem (2) includes encryption means (23) which is designed to encrypt the film which is received from the recording means (3) and decryption means (24) which is designed to decrypt the decrypted film which is stored in the memory means (4). The encrypted film can be decrypted only by using a personal key of the key-holder participant. Decryption of the encrypted film and access to the information in it can be done only by using the personal key, and consequently only by the active consent and cooperation of the key-holder participant. The key-holder participant possesses the personal key which is designed to decrypt the encrypted film. Thus the key-holder participant of the personal meeting knows that there is no reasonable risk to film the personal meeting due to the fact that the film is encrypted and it is inaccessible to any person without his or her consent and without using the personal key that he or she obtains.
- The personal key is a key selected from the group consisting of a password, electronic key, digital key, a key based on magnetic card, a biometric key, a key based on finger print, a key based on retina, or a key based on DNA sample, voice recognition and the like. The encryption subsystem (2) also includes a key reader (25) which is designed to read the personal keys of the key-holder participants. The key reader (25) determines in fact the specific possible type of the corresponding personal key.
- The way of using the system (1): For the sake of fluency we will explain this topic by using an example of a Doctor, a treatment room, a patient and a personal key based on finger print. The Doctor (the service provider) installs the system (1) in the treatment room and when starting the personal meeting the patient (the key-holder participant) puts his finger tip (which is his personal key) on the key reader (25) which is in this case a finger print reader. The recording means (3) streams the film to the encryption subsystem (2) that encrypts the film and streams it to the memory means (4). In the end of the personal meeting the patient may use again his fingerprint for ending the process. The encrypted film may be archived in the memory means, in the encryption subsystem or in any other place or media for enabling the service provider or any authorized person to locate these encrypted films and to decrypt them by the encryption subsystem (2) by using the personal key of the patient. If the patient has a complaint as to an event that to his or her allegation has happened during the personal meeting, then as part of the investigation of this complaint, it is possible to summon the patient to locate the encrypted film, to decrypt it with his or her consent and with his or her own presence, using the personal key that he or she possesses, in order to get to the truth.
- The service provider can install the recording system (1) in his or her treatment room and to use it for many key-holder participants. The key-holder participants can trust the recording system (1) also due to the fact that it is possible to arrange the encryption subsystem (2) in one visible tangible casing that encrypts the film of his or her personal meeting. It is possible, but not necessarily, that all the components of the encryption subsystem (2) will be in one single casing.
- The present invention, as understood from the above explanations, can be related to the encryption subsystem (2) itself, wherein it is designed to communicate with recording means (3) and memory means (4).
FIG. 1 describes schematically the recording system (1) that includes the encryption subsystem (2), the recording means (3) and the memory means (4).
Claims (2)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/670,026 US11050568B2 (en) | 2017-08-07 | 2017-08-07 | System for encryption and decryption films of personal meetings |
PCT/IL2018/050737 WO2019030745A1 (en) | 2017-08-07 | 2018-07-05 | A System for Encryption and Decryption Films of Personal Meetings |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/670,026 US11050568B2 (en) | 2017-08-07 | 2017-08-07 | System for encryption and decryption films of personal meetings |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190044722A1 true US20190044722A1 (en) | 2019-02-07 |
US11050568B2 US11050568B2 (en) | 2021-06-29 |
Family
ID=65230746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/670,026 Active 2038-04-15 US11050568B2 (en) | 2017-08-07 | 2017-08-07 | System for encryption and decryption films of personal meetings |
Country Status (2)
Country | Link |
---|---|
US (1) | US11050568B2 (en) |
WO (1) | WO2019030745A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230082233A1 (en) * | 2021-09-11 | 2023-03-16 | Meir Dahan | Device for recording encrypting and saving videos on external data storage device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US6286098B1 (en) * | 1998-08-28 | 2001-09-04 | Sap Aktiengesellschaft | System and method for encrypting audit information in network applications |
US20040172307A1 (en) * | 2003-02-06 | 2004-09-02 | Gruber Martin A. | Electronic medical record method |
US20050114116A1 (en) * | 1999-04-30 | 2005-05-26 | Recent Memory Incorporated | Device and method for selective recall and preservation of events prior to decision to record the events |
US6968459B1 (en) * | 1999-12-15 | 2005-11-22 | Imation Corp. | Computing environment having secure storage device |
US20100030690A1 (en) * | 2008-07-31 | 2010-02-04 | General Electric Company | Systems and methods for patient-controlled, encrypted, consolidated medical records |
US20160110504A1 (en) * | 2014-10-20 | 2016-04-21 | Rational Surgical Solutions, Llc | Method and system for informed consent |
US20170070487A1 (en) * | 2015-09-09 | 2017-03-09 | Fast Dog, LLC | Secure mobile affirmative consent management |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6171112B1 (en) * | 1998-09-18 | 2001-01-09 | Wyngate, Inc. | Methods and apparatus for authenticating informed consent |
US8468581B2 (en) * | 2009-03-18 | 2013-06-18 | Savemeeting, S.L. | Method and system for the confidential recording, management and distribution of meetings by means of multiple electronic devices with remote storage |
US9372975B2 (en) * | 2011-12-19 | 2016-06-21 | Fujitsu Limited | Secure recording and sharing system of voice memo |
IL223225A (en) * | 2012-11-25 | 2013-11-28 | Eliahu Antopolsky | System for meetings documentation that enables access to the documentation only by the consent of the participants |
-
2017
- 2017-08-07 US US15/670,026 patent/US11050568B2/en active Active
-
2018
- 2018-07-05 WO PCT/IL2018/050737 patent/WO2019030745A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US6286098B1 (en) * | 1998-08-28 | 2001-09-04 | Sap Aktiengesellschaft | System and method for encrypting audit information in network applications |
US20050114116A1 (en) * | 1999-04-30 | 2005-05-26 | Recent Memory Incorporated | Device and method for selective recall and preservation of events prior to decision to record the events |
US6968459B1 (en) * | 1999-12-15 | 2005-11-22 | Imation Corp. | Computing environment having secure storage device |
US20040172307A1 (en) * | 2003-02-06 | 2004-09-02 | Gruber Martin A. | Electronic medical record method |
US20100030690A1 (en) * | 2008-07-31 | 2010-02-04 | General Electric Company | Systems and methods for patient-controlled, encrypted, consolidated medical records |
US20160110504A1 (en) * | 2014-10-20 | 2016-04-21 | Rational Surgical Solutions, Llc | Method and system for informed consent |
US20170070487A1 (en) * | 2015-09-09 | 2017-03-09 | Fast Dog, LLC | Secure mobile affirmative consent management |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230082233A1 (en) * | 2021-09-11 | 2023-03-16 | Meir Dahan | Device for recording encrypting and saving videos on external data storage device |
Also Published As
Publication number | Publication date |
---|---|
WO2019030745A1 (en) | 2019-02-14 |
US11050568B2 (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180261307A1 (en) | Secure monitoring of private encounters | |
US7477740B2 (en) | Access-controlled encrypted recording system for site, interaction and process monitoring | |
US20150188956A1 (en) | Unified Communication Device | |
Hupperich et al. | Flexible patient-controlled security for electronic health records | |
US11521720B2 (en) | User medical record transport using mobile identification credential | |
CN115868152A (en) | Privacy Preserving Image Distribution | |
Riedl et al. | Pseudonymization for improving the privacy in e-health applications | |
US20200152317A1 (en) | Medical Registration System | |
Riedl et al. | A secure e-health architecture based on the appliance of pseudonymization. | |
US11050568B2 (en) | System for encryption and decryption films of personal meetings | |
Milutinovic et al. | Ethical aspects in eHealth–design of a privacy-friendly system | |
KR101754659B1 (en) | The secure automatic permission delegation method at emergency | |
EP2923340B1 (en) | A unit for meetings documentation that enables access to the documentation only by the consent of the participants | |
Mujeye | A survey on multi-factor authentication methods for mobile devices | |
US11968189B2 (en) | Methods and systems for generating a secure communication channel interface for video streaming of sensitive content | |
US20160156612A1 (en) | Smartphone and Computer Application for Personal Meetings Documentation that Enables Access to the Documentation File Only by the Participants | |
US11848767B2 (en) | Privacy-preserving electronic publication and subscription systems | |
US20200366473A1 (en) | Secure Electronic Health Record Access during an Emergency Medical Event | |
US20200250330A1 (en) | Mobile device for recording personal meetings | |
US20050044388A1 (en) | Reprise encryption system for digital data | |
US20230098214A1 (en) | Smartphone that Saves Encrypted Photos in External Storage Devices | |
WO2023003677A1 (en) | Anonymization service for sharing images or videos capturing identity of persons | |
US20230082233A1 (en) | Device for recording encrypting and saving videos on external data storage device | |
US20240305612A1 (en) | Secured storage and playback of recorded collaboration session videos | |
US20210367933A1 (en) | Method and system to ensure that all participants in the generation of a protected data set or data stream through encryption are required to provide their permission for the data to be retrieved through decryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |